Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Similar documents
Cisco Advanced Malware Protection. May 2016

Network Visibility and Advanced Malware Protection. James Weathersby, Director Technical Marketing Gyorgy Acs, Consulting Security Engineer

Agile Security Solutions

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Cisco Advanced Malware Protection for Endpoints. Donald J Case BizCare, Inc. Saturday, May 19, 2018

The Internet of Everything is changing Everything

Protection - Before, During And After Attack

Cisco ASA 5500-X NGFW

Next Generation IPS and Advance Malware Protection. Mahmoud Rabi Consulting Systems Engineer - Security

Cisco Advanced Malware Protec3on

Cisco ASA with FirePOWER Services

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Advanced Malware Protection

Advanced Malware Protection: A Buyer s Guide

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

An Investment Checklist

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Intelligent Cyber Security for Real World

Service Provider Security Architecture

Firewall nové generace na platformě SF, přístupové politiky, analýza souborů, FireAMP a trajektorie útoků

Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016

Cisco Advanced Malware Protection for Networks

The Internet of Everything is changing Everything

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Managed Endpoint Defense

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

CloudSOC and Security.cloud for Microsoft Office 365

Sourcefire and ThreatGrid. A new perspective on network security

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Advanced Malware Protection against WannaCry

THE ACCENTURE CYBER DEFENSE SOLUTION

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Cisco Advanced Malware Protection for Networks

Key Security Measures to Enable Next-Generation Data Center Transformation

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cisco Security Exposed Through the Cyber Kill Chain

Cisco Advanced Malware Protection for Endpoints

Architecting a More Effective Enterprise Security Program

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Cyber Security Stress Test SUMMARY REPORT

Trend Micro and IBM Security QRadar SIEM

RSA NetWitness Suite Respond in Minutes, Not Months

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

Easy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide.

We re ready. Are you?

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

NGFW Requirements for SMBs and Distributed Enterprises

NetDefend Firewall UTM Services

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

AMP for Endpoints & Threat Grid

Behavioral Analytics A Closer Look

HOSTED SECURITY SERVICES

Achieve deeper network security

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Reduce Your Network's Attack Surface

June 2 nd, 2016 Security Awareness

Gladiator Incident Alert

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

How Breaches Really Happen

Are we breached? Deloitte's Cyber Threat Hunting

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

Service Provider View of Cyber Security. July 2017

The Cyber War on Small Business

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Bomgar Discovery Report

Cognitive Threat Analytics Tech update

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

RSA INCIDENT RESPONSE SERVICES

Office 365 Buyers Guide: Best Practices for Securing Office 365

Security in India: Enabling a New Connected Era

Put an end to cyberthreats

Deep Instinct v2.1 Extension for QRadar

From Managed Security Services to the next evolution of CyberSoc Services

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

The C-Level Executive s Guide to Transforming Endpoint Security

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Modern attacks and malware

Cisco Comstor

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Transcription:

Advanced Malware Protection Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

How would you do security differently if you knew you were going to be hacked?

Security Challenges Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation A community that hides in plain sight avoids detection and attacks swiftly 60% of data is stolen in HOURS 85% of point-of-sale intrusions aren t discovered for WEEKS 54% of breaches remain undiscovered for MONTHS 51% increase of companies reporting a $10M loss or more in the last YEAR START HOURS WEEKS MONTHS YEARS

The Reality: Organizations Are Under Attack 95% of large companies targeted by malicious traffic 100% of organizations interacted with websites hosting malware Source: 2014 Cisco Annual Security Report Cybercrime is lucrative, barrier to entry is low Hackers are smarter and have the resources to compromise your organization Malware is more sophisticated Organizations face tens of thousands of new malware samples per hour Phishing, Low Sophistication Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape 1990 1995 2000 2005 2010 2015 2020 Viruses 1990 2000 Worms 2000 2005 Spyware and Rootkits 2005 Today APTs Cyberware Today +

AMP Advanced Malware Protection

The Full Attack Continuum Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Cloud Email & Web Point-in-time Continuous

Point-in-Time Malware Detection Alone is not 100% Effective It will catch But only takes 99% 1% of threats to cause a breach

Cisco AMP Defends With Retrospective Security To be effective, you have to be everywhere Continuously

AMP provides contextual awareness and visibility that allows you to take control of an attack before it causes damage Who Focus on these users first What These applications are affected Where The breach impacted these areas When This is the scope of exposure over time How Here is the origin and progression of the threat

Cisco s AMP Everywhere Strategy Means Protection Across the Extended Network Virtual PC Mobile MAC AMP for Endpoints AMP for Networks AMP Private Cloud Virtual Appliance AMP Threat Grid Dynamic Malware Analysis + Threat Intelligence Engine AMP on ASA Firewall with FirePOWER Services AMP on Web & Email Security Appliances CWS AMP for Cloud Web Security & Hosted Email

NSS Labs Report Comparative Testing on Breach Detection Systems Who is NSS Labs? What was measured? What Cisco-Sourcefire products were tested? What competitor products were evaluated? NSS Labs, one of the best and most thorough independent testing bodies in the industry, performed comparative testing on Breach Detection Systems. Security Effectiveness of Breach Detection Systems HTTP/Email Malware, Exploits, Evasions, and False Positive Rate Total Cost of Ownership per protected Mbps AMP Everywhere AMP for Networks and AMP for Endpoints (TCO calculations include this set of FireAMP connectors) FirePOWER 8120 (with AMP subscription)* FireEye, AhnLab, Fortinet, TrendMicro, Fidelis BDS Methodology v1.5 [The methodology] utilizes real threats and attack methods that exist in the wild and are actually being used by cyber-criminals and other threat actors. This is the real thing, not facsimile; systems under test (SUT) are real stacks connected to a live internet feed. --NSS Labs *Dedicated AMP Appliances (AMP8150/AP7150) were not shipping at the time of the test, otherwise one would have been used

The Results Cisco AMP is a Leader in Security Effectiveness and TCO and offers Best Protection Value NSS Labs Security Value Map (SVM) for Breach Detection Systems Cisco Advanced Malware Protection Best Protection Value 99.0% Breach Detection Rating Lowest TCO per Protected- Mbps Security Effectiveness Other Products Do Not Provide Retrospective Security After a Breach TCO per Protected-Mbps

Business Impact Summary Better Protection: Before, During, After Better Visibility and Control Better Intelligence Faster Response Save Money, Time Protect Resources and Maintain Business Critical Functions Lowest TCO and Highest Security Leadership (NSS Labs)

AMP Case Studies

Are you able to defend against advanced malware? 1 Can you detect advanced malware in web and email? 2 Assess your current level of network protection 3 Assess your current level of endpoint protection

Block Threats Before They Breach Bank Case Study BEFORE Challenge Solution Result Experienced security team of 7 supporting over 120 locations needed greater intelligence to quickly identify and stop threats. Current defenses alerted personnel and logged details but did nothing to aid investigation of the issue. Augmented intrusion prevention systems with FireAMP for Endpoint. After installation of FireAMP, a targeted attack was identified and remediated in half a day. 7 days after the initial attack, new business processes and intelligences implemented by FireAMP resulted in the immediate mitigation of a second targeted attack.

Identify Scope And Remediate Impact After Breach Power Utility Case Study AFTER Challenge Solution Result The company is a frequent victim of spear fishing campaigns with indications of infection emanating from multiple sources. Added FireAMP to a system already using FirePOWER to enable them to track and investigate suspicious file activity. The company gained complete visibility into their malware infections, determined the attack vector, assessed the impact to the network and made intelligent surgical decisions for remediation in a fraction of the time than it would take to respond manually.

AMP- Demo